. . "So a successful exploit is probably going to gain the user???s level of access to the file system, the network, and other running processes." . . .